Xem 1-20 trên 673 kết quả Authenticity
  • Tài lieuj tham khảo Kỹ thuật xử lý Authentication trong Sharepoint Server

    doc11p phucmtsd 12-07-2010 160 54   Download

  • Security Form Authentication là phương thức giúp đảm bảo an toàn cho các ứng dụng ASP.NET. Nó đóng vai trò quan trọng trong việc đảm bảo an ninh bảo mật công nghệ thông tin. Và để hiểu rõ hơn về điều này mời các bạn tham khảo bài giảng ASP.NET Security Form Authentication sau đây.

    pdf24p cocacola_10 02-12-2015 53 5   Download

  • will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos – a private-key authentication service then X.509 directory authentication service

    ppt23p muathu_102 28-01-2013 35 3   Download

  • We have looked at confidentiality services, and also examined the information theoretic framework for security.

    ppt33p muathu_102 28-01-2013 51 3   Download

  • In this chapter, you learned to: Explain the funtion and operation of the authentication, authorization, and accounting (AAA) protocol; configure a Cisco router to perform AAA authentication with a local database; describe how to configure Cisco ACS to support AAA for Cisco IOS routers; configure server-base AAA.

    pdf78p youcanletgo_01 04-01-2016 25 3   Download

  • Tham khảo bài thuyết trình 'data authentication part ii', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    ppt29p muathu_102 28-01-2013 35 2   Download

  • Objectives of Chapter 11: To define message integrity; to define message authentication; to define criteria for a cryptographic hash function; to define the Random Oracle Model and its role in evaluating the security of cryptographic hash functions; to distinguish between an MDC and a MAC; to discuss some common MACs.

    pdf7p levuphongqn 18-08-2015 31 2   Download

  • Objectives of Chapter 14: To distinguish between message authentication and entity authentication; to define witnesses used for identification; to discuss some methods of entity authentication using a password; to introduce some challenge-response protocols for entity authentication; to introduce some zero-knowledge protocols for entity authentication; to define biometrics and distinguish between physiological and behavioral techniques.

    pdf7p levuphongqn 18-08-2015 42 2   Download

  • Authentication And Threats and Attacks to information security, polices and laws includes about Definition, Some basic authentication methods, Authentication Protocols, Kerberos-An security protocols in the real world.

    ppt67p cocacola_17 11-12-2015 44 2   Download

  • The contents are presented in chapter 7: Define authentication, authentication credentials, authentication models, authentication servers, extended authentication protocols, Virtual Private Network (VPN). Inviting you to refer.

    ppt54p kiepnaybinhyen_02 25-12-2015 23 2   Download

  • Bài giảng Lập trình WebForm này trình bày những kiến thức về forms authentication. Nội dung chính trong bài gồm có: Forms Authentication? Cách thức thực thi, demo minh họa. Mời các bạn cùng tham khảo để biết thêm các nội dung chi tiết.

    ppt25p nhanmotchut_4 01-11-2016 22 2   Download

  • With the light that literature has shed on the merits of authentic videos, this paper aims to foreground two video input enhancement activities, namely annotating and captioning and argue that when embedded in authentic videos, annotations and captions aid EFL learners’ vocabulary acquisition and thus English listening comprehension.

    pdf8p vicross2711 20-06-2019 35 2   Download

  • Keeping in the view, the importance of the authentication systems, we analyze various authentication techniques in our paper. And try to find out various advantages and disadvantages of various authentication systems. This paper gives the emphasis on the various issues involved in the various authentication techniques.

    pdf10p girlsseek 27-02-2019 12 1   Download

  • In this paper, the authors present a multimodal biometric system using face and fingerprint features with the incorporation of Zernike Moment (ZM) and Radial Basis Function (RBF) Neural Network for personal authentication.

    pdf12p girlsseek 27-02-2019 17 0   Download

  • In this paper, the authors present a hybrid multibiometric authentication person system that integrates both multi modal and multi algorithmic. Multi-modal, the system using face and fingerprint features, has long been considered common in personal authentication. Multi-algorithm is the system which uses Circularly Orthogonal Moments, such as Zernike Moment (ZM), Pseudo Zernike Moment (PZM), Polar Cosine Transform (PCT) and Radial Basis Function (RBF) Neural Networks. These moments are widely used because their magnitudes are invariant to image rotation, scaling and noise.

    pdf6p girlsseek 27-02-2019 6 0   Download

  • In this paper, we have proposed a Secured password based mutual authentication protocol for client-sever computing using elliptic curve cryptography. The proposed framework provides mutual authentication and session key agreement in client-sever environment. It provides secure communication between client and server with help of user email-id and mobile phone as authentication device for mobile hand held device.

    pdf4p byphasse043256 21-03-2019 8 0   Download

  • This paper proposes a Hybrid Improved Bacterial Swarm (HIBS) optimization algorithm for the minimization of Equal Error Rate (EER) as a performance measure in a hand-based multimodal biometric authentication system. The hybridization of the algorithm was conducted by incorporating Bacterial Foraging Optimization (BFO) and Particle Swarm Optimization (PSO) algorithm to mitigate weaknesses in slow and premature convergence.

    pdf19p meriday 20-04-2019 11 0   Download

  • In this paper, we propose a novel technique that uses fingerprint features with coordinates (x, y), angle and type of feature as watermark information for authentication in H.264/AVC video.

    pdf14p vititan2711 13-08-2019 6 0   Download

  • The purpose of this study is to empirically examine the effects of compassion experienced by smallto-medium enterprise (SME) employees on affective commitment through authenticity and positive emotion.

    pdf8p tozontozon 25-04-2020 0 0   Download

  • The purpose of this study is to examine the role of change readiness in mediating the effects of ambidextrous organization and authentic followership on innovative performance. The result of this study indicate that authentic followership, ambidextrous organization and change readiness directly influenced on innovative performance.

    pdf8p tozontozon 25-04-2020 2 0   Download




nocache searchPhinxDoc


Đồng bộ tài khoản